Challenges in decentralized name management: the case of ENS

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu… - Proceedings of the 22nd …, 2022 - dl.acm.org
DNS has often been criticized for inherent design flaws, which make the system vulnerable
to attack. Further, domain names are not fully controlled by users, meaning that they can …

[PDF][PDF] Ghost domain reloaded: Vulnerable links in domain name delegation and revocation

X Li, B Liu, X Bai, M Zhang, Q Zhang, Z Li… - Annual Network and …, 2023 - par.nsf.gov
In this paper, we propose PHOENIX DOMAIN, a general and novel attack that allows
adversaries to maintain the revoked malicious domain continuously resolvable at scale …

Panning for gold. eth: Understanding and Analyzing ENS Domain Dropcatching

M Muzammil, Z Wu, A Balasubramanian… - Proceedings of the …, 2024 - dl.acm.org
Ethereum Name Service (ENS) domains allow users to map human-readable names (such
as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …

Rethinking the Security Threats of Stale {DNS} Glue Records

Y Zhang, B Liu, H Duan, M Zhang, X Li, F Shi… - 33rd USENIX Security …, 2024 - usenix.org
The Domain Name System (DNS) fundamentally relies on glue records to provide
authoritative nameserver IP addresses, enabling essential in-domain delegation. While …

Unresolved issues: prevalence, persistence, and perils of lame delegations

G Akiwate, M Jonker, R Sommese, I Foster… - Proceedings of the …, 2020 - dl.acm.org
The modern Internet relies on the Domain Name System (DNS) to convert between human-
readable domain names and IP addresses. However, the correct and efficient …

[图书][B] Formal Methods for a Robust Domain Name System

SKR Kakarla - 2022 - search.proquest.com
Abstract The Domain Name System (DNS), one of the foundations of the modern-day
Internet, primarily translates domain names into IP addresses, enabling easy access to …

DSecO: Domain Name System (DNS) Data as a Knowledge Graph for Enhanced Security Analysis

D Bringer, L Tailhardat - 2025 - hal.science
Managing Domain Name System (DNS) records presents challenges in terms of consistency
and tracking over time, which can have operational impacts, particularly on cybersecurity. In …

Governmental domain name management: policy versus practice

WJ Kobes - 2023 - essay.utwente.nl
Domain names and the domain name system (DNS) are two core technologies that provide
a backbone to the internet. Domain names are often used to present websites, or for sending …

[图书][B] Identifying DNS Infrastructure Hijacks using Large Scale Measurements

G Akiwate - 2022 - search.proquest.com
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker
controlling part or all of the DNS infrastructure for adomain. These hijacks are typically a …

[PDF][PDF] Out of sight, out of mind

S Pletinckx, K Borgolte, T Fiebig - … of the th ACM Conference on … - repository.tudelft.nl
Security misconfigurations and neglected updates commonly lead to systems being
vulnerable. Ranging from default passwords to unpatched software, many systems, such as …